0.9(top 50%)
impact factor
490(top 50%)
papers
2.6K(top 50%)
citations
20(top 50%)
h-index
1.1(top 50%)
impact factor
603
all documents
3.1K
doc citations
38(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1The European Union general data protection regulation: what it is and what it meansInformation and Communications Technology Law2019195
2Contract law 2.0: ‘Smart’ contracts as the beginning of the end of classic contract lawInformation and Communications Technology Law2017149
3Algorithmic risk assessment policing models: lessons from the Durham HART model and ‘Experimental’ proportionalityInformation and Communications Technology Law2018101
4Artificial intelligence and augmented intelligence collaboration: regaining trust and confidence in the financial sectorInformation and Communications Technology Law201892
5Virtual money laundering: the case of Bitcoin and the Linden dollarInformation and Communications Technology Law201281
6Cyberhate: the globalization of hateInformation and Communications Technology Law200977
7Privacy implications and liability issues of autonomous vehiclesInformation and Communications Technology Law201777
8Hate speech on social media networks: towards a regulatory framework?Information and Communications Technology Law201955
9Internet regulation in China: the never‐ending cat and mouse game1Information and Communications Technology Law200452
10Blogging: self presentation and privacyInformation and Communications Technology Law200848
11Trust and reputation on eBay: Towards a legal framework for feedback intermediariesInformation and Communications Technology Law200641
12Queer theory, cyber-ethnographies and researching online sex environmentsInformation and Communications Technology Law200936
13Internet banking: The digital voyage of banking and money in cyberspaceInformation and Communications Technology Law199934
14Consent for processing children’s personal data in the EU: following in US footsteps?Information and Communications Technology Law201732
15Privacy policies, cross-border health data and the GDPRInformation and Communications Technology Law201930
16E-Crime 2.0: the criminological landscape of new social mediaInformation and Communications Technology Law201229
17Regulating Hate Speech in Cyberspace: Issues of Desirability and EfficacyInformation and Communications Technology Law200227
18The supremacy of online white supremacists – an analysis of online discussions by white supremacistsInformation and Communications Technology Law201526
19Representation of temporal knowledge in events: The formalism, and its potential for legal narrativesInformation and Communications Technology Law199825
20Using Web-based Legal Decision Support Systems to Improve Access to JusticeInformation and Communications Technology Law200225
21Privacy is dead, get over it! 1 Information privacy and the dream of a risk-free societyInformation and Communications Technology Law200825
22Chinese judicial justice on the cloud: a future call or a Pandora’s box? An analysis of the ‘intelligent court system’ of ChinaInformation and Communications Technology Law201725
23Deepfakes and image manipulation: criminalisation and controlInformation and Communications Technology Law202025
24Sega Enterprises Ltd v Accolade Inc.(1993, 9th us circuit): Reverse engineering a defense to copyright infringement?Information and Communications Technology Law199322
25Sensitive-by-distance: quasi-health data in the algorithmic eraInformation and Communications Technology Law201722
26Icansee you: harassment and stalking on the InternetInformation and Communications Technology Law200921
27Crime and technology: New rules in a new world*Information and Communications Technology Law199820
28Identity Manipulation in Cyberspace as a Leisure Option: Play and the Exploration of SelfInformation and Communications Technology Law200520
29Proactive privacy for a driverless ageInformation and Communications Technology Law201620
30On the Formal Analysis of Normative ConflictsInformation and Communications Technology Law200019
31Algorithms or advocacy: does the legal profession have a future in a digital world?Information and Communications Technology Law201618
32The only gay in the village: Sexuality and the netInformation and Communications Technology Law200617
33Electronic surveillance of Internet access in the American workplace: implications for managementInformation and Communications Technology Law201017
34Argument‐based explanation of the British nationality act as a logic programInformation and Communications Technology Law199316
35Intellectual property implications of multimedia products: A case studyInformation and Communications Technology Law199716
36Spies in Suits: New Crimes of the Information Age from the United States and Canadian PerspectivesInformation and Communications Technology Law200116
37The Third Party and Beyond. An analysis of the different parties, in particular The Fifth, involved in online dispute resolutionInformation and Communications Technology Law200616
38Mobile phone technology and sexual abuseInformation and Communications Technology Law201216
39Cross-border issues under EU data protection law with regards to personal data protectionInformation and Communications Technology Law201716
40Revisiting the ‘shrinkwrap license’:ProCD inc. v. ZeidenbergInformation and Communications Technology Law199715
41Downloading, information filtering and copyrightInformation and Communications Technology Law199715
42Intelligent Systems to Support Deliberative Democracy in Environmental RegulationInformation and Communications Technology Law200115
43The Intersection of Technology Crimes and Cyberspace in Europe: The Case of HungaryInformation and Communications Technology Law200315
44A brief history of spamInformation and Communications Technology Law200615
45Anti-spam legislation: An analysis of laws and their effectivenessInformation and Communications Technology Law200715
46The new frontier of money laundering: how terrorist organizations use cyberlaundering to fund their activities, and how governments are trying to stop themInformation and Communications Technology Law201115
47Bare necessities: the argument for a ‘revenge porn’ exception in Section 230 immunityInformation and Communications Technology Law201415
48Human digital thought clones: the Holy Grail of artificial intelligence for big dataInformation and Communications Technology Law202115
49Approaching the human in the loop – legal perspectives on hybrid human/algorithmic decision-making in three contextsInformation and Communications Technology Law202215
50Copyright Regulation with Argumentation AgentsInformation and Communications Technology Law200114